QUESTION 100Which of the following is the team that handles the investigation, resolution, and disclosure of security vulnerabilities in vendor products and services?

A. CSIRTB. ICASIC. USIRPD. PSIRT

Answer: D

QUESTION 101Which of the following is not true about listening ports?

A. A listening port is a port held open by a running application in order to accept inbound connections.B. Seeing traffic from a known port will identify the associated service.C. Listening ports use values that can range between 1 and 65535.D. TCP port 80 is commonly known for Internet traffic.

Answer: B

QUESTION 102Which of the following are examples of some of the responsibility of a corporate CSIRT and the policies it helps create? (Choose four)

QUESTION 103What is the difference between deterministic and probabilistic assessment method?

A. At deterministic method we know the facts beforehand and at probabilistic method we make assumptionsB. At probabilistic method we know the facts beforehand and at deterministic method we make assumptionsC. Probabilistic method has an absolute natureD. Deterministc method has an absolute nature

Answer: AD

QUESTION 104Which of the following is not an example of the VERIS main schema categories?

QUESTION 107Which two potions about deterministic and probabilistic analysis are true? (Choose two.)

A. probabilistic analysis uses data known beforehand and deterministic analysis is based off assumptions.B. Deterministic analysis uses data known beforehand and probabilistic analysis based off of assumptions.C. Deterministic analysis is based off of assumptionsD. Probabilistic analysis result in a result that is definitive.E. probabilistic analysis results in a result that is not definitive.

Answer: BE

QUESTION 108Refer to exhibit. Which option is the logical source device for these events?